Included on every HIPAA plan. No negotiating, no waiting.
All data encrypted in transit and at rest on every plan.
Control exactly who can view, edit, or trigger each workflow.
Every action is logged with a timestamp and user ID. Always on.
Independently verified security controls across the platform.